EP2149221A2 - Method of authentication of an entity by a verifying entity - Google Patents

Method of authentication of an entity by a verifying entity

Info

Publication number
EP2149221A2
EP2149221A2 EP08805825A EP08805825A EP2149221A2 EP 2149221 A2 EP2149221 A2 EP 2149221A2 EP 08805825 A EP08805825 A EP 08805825A EP 08805825 A EP08805825 A EP 08805825A EP 2149221 A2 EP2149221 A2 EP 2149221A2
Authority
EP
European Patent Office
Prior art keywords
entity
bits
vector
binary
authenticated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP08805825A
Other languages
German (de)
French (fr)
Other versions
EP2149221B1 (en
Inventor
Matthew Robshaw
Henri Gilbert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
France Telecom SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom SA filed Critical France Telecom SA
Publication of EP2149221A2 publication Critical patent/EP2149221A2/en
Application granted granted Critical
Publication of EP2149221B1 publication Critical patent/EP2149221B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • the present invention relates to a method of authenticating an entity to be authenticated with a checking entity.
  • the invention finds a particularly advantageous application in the field of cryptographic authentication protocols of microchips at very low cost, with or without contact, including radio frequency tags RFID ("Radio Frequency IDentification").
  • Low-cost electronic chips such as RFID for example, are used in many applications such as labeling and tracing of objects (drugs, library books, etc.), or the production and verification of tickets or electronic tickets, such as tickets.
  • any authentication protocol between an entity to be authenticated such as a low-cost chip, and a reader acting as a verifying entity, must take into account the extreme limitation of the calculation resources of this type of chip, which are most often wired logic.
  • FIG. 1 represents the data exchanges performed during the HB + protocol between the entity to be authenticated and the audit entity.
  • RFID for example, and the checking entity, a reader of the chip, share a pair of secret keys x and y constituted by binary vectors of n bits.
  • the HB + protocol is run on successive cycles. At each turn, the chip randomly draws (block 100) and transmits (1) to the reader a binary vector b of n bits. Similarly, the reader randomly draws (block 200) and transmits (2) to the chip an a binary vector of n bits. The drawing of the vectors b and a is done according to a uniform probability law.
  • the chip then responds to the challenge launched by the reader by calculating (block
  • v is a noise bit drawn at leaves by the chip (block 1 10); it takes the value 1 with a probability ⁇ ⁇ 1/2 and the value 0 with a probability (I - / 7).
  • the authentication is accepted (block 240) if and only if the number of rejected rounds nbr of the counter is lower than a given threshold t (block 230).
  • the HB + protocol benefits, by comparison with the HB protocol historically prior and differing in that the noise response did not include a term b * y, because of the masking effect induced by the binary vector b coupled to the secret key y; indeed, the HB protocol was sensitive to attacks consisting of the opponent sending constant challenges and listening to the reader's responses; the most frequent answer being a »x, and a being known, one could at first obtain a» x for a sufficient number of values of a, and in a second time deduce x by resolution of a linear system.
  • a first disadvantage is that even if, as we have seen, it resists some active attacks on a, this protocol is nevertheless vulnerable to other attacks encountered when an adversary has access to results in terms of success / failures of several successive authentications.
  • Such an attack consists in intercepting the challenge when transmitting the reader to the chip and successively modifying the bits. If, for example, the first bit of a is modified, it is understood that if the result is not changed as a result of this modification, it can be concluded that the first bit of the secret vector x is probably 0. Conversely, if the result is changed, the first bit of x is probably equal to 1. To obtain all of the n bits of x, it suffices to modify the second bit of a to know the second bit of x, and so on until not .
  • a second disadvantage of the HB + protocol is that it results in an excessively high number of false alerts, a false alarm being defined as the rejection of the authentication of legitimate chips.
  • a false alarm being defined as the rejection of the authentication of legitimate chips.
  • HB + a third disadvantage of HB + is the excessive complexity that it induces in the communications between the chip and the reader.
  • the invention therefore relates to a method of authenticating an entity with a checking entity, said entities sharing a pair of secret keys X and Y. Said method is remarkable in that said secret keys X and Y are binary matrices n x m (n, m> 1), and that it comprises repeated steps r times (r> 1) consisting of:
  • the method according to the invention offers, compared to the HB + protocol, a better resistance to attacks consisting in modifying the bits of the challenge a in order to reconstitute the secret X. Indeed, if the first bit of a is modified, this modification affects the products of this bit with the first bits of the m columns of X, which also affects the m bits of the product aX and therefore the response z as a whole.
  • said matrices X and Y are matrices of Toeplitz. It will be seen in detail later that this advantageous arrangement makes it possible to limit the storage capacity of chips and readers to (n + m - 1) instead of nxm in the case of selected dies. any. Another advantage is to simplify the calculation of the products ⁇ X and bY.
  • the invention also relates to an entity intended to be authenticated by a checking entity, said entities sharing a pair of secret keys X and Y, remarkable in that said entity to be authenticated comprises means for storing secret keys X and Y constituted by binary matrices nxm (n, m> 1), communication means with the checking entity, and calculation means adapted to perform r times (r ⁇ 1) the steps of: - drawing lots and transmitting to the entity checking a binary vector b of n bits,
  • the invention further relates to a computer program comprising program instructions for implementing the steps performed by said entity to authenticate when said program is executed by a computer forming part of said computing means of the entity to be authenticated.
  • the invention also relates to a verification entity sharing a pair of secret keys X and F with an entity to be authenticated, which is remarkable in that the said checking entity comprises means for storing secret keys X and Y constituted by nx bit matrices.
  • m (n, m> l)
  • communication means with the entity to be authenticated
  • calculation means able to perform r times (r ⁇ 1) the steps of:
  • the invention relates to a computer program comprising program instructions for carrying out the steps performed by said checking entity when said program is executed by a computer forming part of said checking entity calculation means.
  • FIG. 2 represents the exchanges between the entity to be authenticated and the audit entity during the process according to the invention.
  • FIG. 3 is a diagram of an entity to be authenticated according to the method of FIG. 2.
  • FIG. 4 is a diagram of a verifying entity responsible for authenticating the entity of FIG. 3 according to the method of FIG. 2.
  • FIG. 2 illustrates an authentication method enabling a checking entity, a chip reader with or without contact, for example, to verify the identity of an entity to be authenticated which, in this example, may be an RFID chip .
  • the method described in FIG. 2 is a so-called symmetrical method where the two entities, chip and reader, share the same secret keys.
  • These, designated X and Y, are binary matrices n x m (n, m> 1) with n rows and m columns.
  • the secret keys X and Y are stored in storage means of the chip and the reader referenced respectively 10 and 20 in FIG. 2, as well as in FIGS. 3 and 4.
  • the process according to the invention is structured in repeated steps r times (r> 1).
  • r times means that the exchanges between the chip and the reader can be carried out sequentially in revolutions of three passes, as indicated in FIG. 2, where the number of revolutions nbt is incremented by 1 at each turn by a counter (block 250), or in parallel over three passes, each pass comprising the transmission of r data from one entity to another.
  • chip 1 draws at each turn (block
  • each bit of the noise vector c can be drawn independently, according to a Bemoulli law of parameter ⁇ ⁇ 1/2.
  • the noise vector c can also be drawn from among the set of m bit vectors whose sum of bits, or Hamming weight, is at most equal to or equal to the value ⁇ xm with ⁇ ⁇ l 2. Good Of course, the noise vector c can be drawn by the chip at the same time as it draws the binary vector b which will be recalled that it serves as a masking to the active attacks on the vector a.
  • a first strategy consists in accepting the authentication (block 240 ') if and only if the sum S of the Hamming weights of the r error vectors e (block 221') is less than a threshold T. given (block 230 '), equal for example to r ( ⁇ + ⁇ ) m where ⁇ is a margin less than 1/2, possibly zero.
  • a second strategy is to accept the authentication if and only if the Hamming weight of the error vector e obtained at each turn is less than a threshold t.
  • a third strategy is to accept the authentication if and only if the Hamming weight of the error vector e obtained at each turn is equal to a value t.
  • the parameter t is ( ⁇ + ⁇ ) m where ⁇ is a margin less than 1/2, possibly zero.
  • the sequence of exchanges between chip 1 and reader 2 is: sending b to the reader, sending a to the chip, drawing c by the chip and sending z to the reader.
  • another sequence could also be used, namely: sending a to the chip, drawing b and c by the chip and sending b and z to the reader. This last sequence has the advantage of reducing the number of exchanges.
  • each of the matrices X and Y can be selected at inside a strict subset of the set of matrices nxm and described in the chip using a number of bits strictly less than nxm.
  • the amount of memory needed to store each matrix can be reduced to only (n + m -1) when X and Y are Toeplitz matrices, namely matrices with constant coefficients along the diagonals, and whose set of coefficients is entirely determined by the coefficients of the first row and the first column.
  • X is a matrix of Toeplitz and if X 1 ⁇ denotes the coefficient of the ith row and the jth column, x h] is equal to v, + u if * is greater than or equal to j, and ⁇ U] ⁇ ⁇ otherwise.
  • the following embodiment makes it possible to very efficiently perform bit by bit the product of a binary vector, for example, and a Toeplitz matrix, X for example, described by means of the (n + m - 1) coefficients. of its first row and its first column, and using two registers of m bits, one to calculate the current row of the matrix and the other, initialized to 0, to accumulate the partial results of the vector-matrix product.
  • the first register is initialized using the first line of X, then each of the bits of the vector a is treated in the following way: if the current bit of a is equal to 1, the value of the current line of X is combined by "or" exclusive bitwise with the current value of the register of accumulation of partial results. Otherwise, the current value of this register is not changed.
  • the register containing the current row of this matrix is updated by rotating the contents of this register one bit towards the right, followed by the copy in the left cell of this register of the coefficient of the first column corresponding to the new current line.
  • the chip 1 intended to be authenticated by the reader 2, these two entities sharing a pair of secret keys X and Y comprises means 10 for storing the secret keys X and Y constituted by binary matrices nxm (n, m> l), means 12 of communication with the reader 2, and means 1 1 of calculation able to perform r times (r ⁇ 1) the steps of, according to the method described with reference to Figure 2:
  • a reader 2 responsible for authenticating a chip 1 comprising means 20 for storing the secret keys X and Y constituted by binary matrices nxm (n, m> l), means 22 communication with the chip 1 to authenticate, and calculation means 21 capable of performing r times (r ⁇ 1) the steps of, according to the method described with reference to FIG.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Method of authentication of an entity by a verifying entity, said entities sharing a pair of secret keys X and Y. According to the invention, said secret keys X and Y are n ´ m binary matrices (n,m >l), said method comprising steps repeated r times (r ≥ l) consisting: - for the entity (1) to be authenticated and the verifying entity (2), in exchanging binary vectors a and b of, n bits respectively, drawn randomly by the verifying entity (2) and the entity (1) to be authenticated; and, for the entity (1) to be authenticated, in randomly drawing a binary noise vector c of m bits, each of said m bits being equal to 1 with a probability η of less than 1/2, and in calculating and transmitting to the verifying entity (2) a response vector z of m bits equal to, - for the verifying entity, in calculating the Hamming weight (220') of an error vector, then, for the verifying entity, in accepting (240') the authentication if the Hamming weight of the r error vectors e satisfy a comparison relation (230') with a parameter (T) dependent on the probability η. Application to cryptographic protocols for authenticating electronic chips at very low cost.

Description

PROCEDE D'AUTHENTIFICATION D'UNE ENTITE PAR UNE ENTITE METHOD FOR AUTHENTICATING AN ENTITY BY AN ENTITY

VERIFICATRICEAuditor

La présente invention concerne un procédé d'authentification d'une entité à authentifier auprès d'une entité vérificatrice.The present invention relates to a method of authenticating an entity to be authenticated with a checking entity.

L'invention trouve une application particulièrement avantageuse dans le domaine des protocoles cryptographiques d'authentification de puces électroniques à très bas coût, avec ou sans contact, notamment les étiquettes radiofréquence RFID (« RadioFrequency IDentification »).The invention finds a particularly advantageous application in the field of cryptographic authentication protocols of microchips at very low cost, with or without contact, including radio frequency tags RFID ("Radio Frequency IDentification").

Les puces électroniques à bas coût, du type RFID par exemple, sont utilisées dans de nombreuses applications comme l'étiquetage et le traçage d'objets (médicaments, livres d'une bibliothèque, etc.), ou encore la production et la vérification de tickets ou de billets électroniques, tels que des titres de transport.Low-cost electronic chips, such as RFID for example, are used in many applications such as labeling and tracing of objects (drugs, library books, etc.), or the production and verification of tickets or electronic tickets, such as tickets.

Quelle que soit l'application considérée, il est nécessaire de prévenir les fraudes qui pourraient survenir sur la base de la falsification des puces, en particulier leur recopie, ou clonage, ou le rejeu des données qu'elles transmettent. Afin de protéger les applications contre de telles attaques, il est impératif de procéder à une authentification des puces lors de leurs interactions avec un lecteur.Whatever the application considered, it is necessary to prevent fraud that may occur on the basis of the falsification of chips, in particular their copying, or cloning, or the replay of the data they transmit. In order to protect the applications against such attacks, it is imperative to authenticate the chips during their interactions with a reader.

Cependant, tout protocole d'authentification entre une entité à authentifier, comme une puce à bas coût, et un lecteur jouant le rôle d'entité vérificatrice, doit tenir compte de l'extrême limitation des ressources de calcul de ce type de puces, qui sont le plus souvent à logique câblée.However, any authentication protocol between an entity to be authenticated, such as a low-cost chip, and a reader acting as a verifying entity, must take into account the extreme limitation of the calculation resources of this type of chip, which are most often wired logic.

Récemment, il a été proposé (A. Juels et S.A. Weis, « Authenticating Pervasive Devices with Human Protocols », in V. Shoup, Editor, Advances in Cryptology-Crypto 05, Lectures Notes in Computer Science, Vol. 3126, pp. 293-308, Springer Verlag) un protocole d'authentification symétrique spécifiquement conçu pour répondre aux besoins des puces RFID. Ce protocole est connu sous le nom de HB+ (Hopper-Blum). La figure 1 représente les échanges de données effectués au cours du protocole HB+ entre l'entité à authentifier et l'entité vérificatrice.Recently, it has been proposed (A. Juels and SA Weis, "Authenticating Pervasive Devices with Human Protocols", in V. Shoup, Editor, Advances in Cryptology-Crypto 05, Lectures Notes in Computer Science, Vol 3126, pp. 293 -308, Springer Verlag) a symmetric authentication protocol specifically designed to meet the needs of RFID chips. This protocol is known as HB + (Hopper-Blum). FIG. 1 represents the data exchanges performed during the HB + protocol between the entity to be authenticated and the audit entity.

Comme on peut le voir sur cette figure, l'entité à authentifier, une puceAs can be seen in this figure, the entity to authenticate, a chip

RFID par exemple, et l'entité vérificatrice, un lecteur de la puce, partagent une paire de clés secrètes x et y constituées par des vecteurs binaires de n bits.RFID for example, and the checking entity, a reader of the chip, share a pair of secret keys x and y constituted by binary vectors of n bits.

Ces clés secrètes sont stockées dans des moyens de stockage de la puce et du lecteur référencés respectivement 10 et 20.These secret keys are stored in storage means of the chip and the reader referenced respectively 10 and 20.

Le protocole HB+ se déroule sur r tours successifs. A chaque tour, la puce tire au sort (bloc 100) et transmet (1 ) au lecteur un vecteur binaire b de n bits. De même, le lecteur tire au sort (bloc 200) et transmet (2) à la puce un vecteur binaire a de n bits. Le tirage au sort des vecteurs b et a est réalisé selon une loi de probabilité uniforme.The HB + protocol is run on successive cycles. At each turn, the chip randomly draws (block 100) and transmits (1) to the reader a binary vector b of n bits. Similarly, the reader randomly draws (block 200) and transmits (2) to the chip an a binary vector of n bits. The drawing of the vectors b and a is done according to a uniform probability law.

La puce répond ensuite au défi a lancé par le lecteur en calculant (blocThe chip then responds to the challenge launched by the reader by calculating (block

120) et en lui transmettant (3) une réponse bruitée z = a » x ®b » y ® v , où • représente l'opération produit scalaire modulo 2 et ® l'addition modulo 2. v est un bit de bruit tiré au sort par la puce (bloc 1 10) ; il prend la valeur 1 avec une probabilité η < 1/2 et la valeur 0 avec une probabilité (I -/7).120) and by transmitting to it (3) a noisy response z = a »x ®b» y ® v, where • represents the scalar product operation modulo 2 and ® the addition modulo 2. v is a noise bit drawn at leaves by the chip (block 1 10); it takes the value 1 with a probability η <1/2 and the value 0 with a probability (I - / 7).

Le lecteur rejette le tour courant (bloc 210) si la réponse z reçue ne vérifie pas la relation z = a » x ®b » y ; dans ce cas, un compteur des nombres de tours rejetés nbr est incrémenté d'une unité (bloc 220). A l'issue des r tours, comptabilisés par un compteur du nombre de tours nbt (bloc 250), l'authentification est acceptée (bloc 240) si et seulement si le nombre de tours rejetés nbr du compteur est inférieur à un seuil t donné (bloc 230). La valeur de t est bien entendu fonction de la probabilité η ; une valeur simple de t est par exemple t = r x η .The reader rejects the current round (block 210) if the response z received does not satisfy the relation z = a »x ®b» y; in this case, a counter of rejected rpm numbers nbr is incremented by one unit (block 220). At the end of the rounds, counted by a counter of the number of rounds nbt (block 250), the authentication is accepted (block 240) if and only if the number of rejected rounds nbr of the counter is lower than a given threshold t (block 230). The value of t is of course a function of the probability η; a simple value of t is for example t = r x η.

Bien que les échanges du protocole HB+ proposé soient structurés en r tours de trois passes, il est possible de se ramener à un échange de trois passes en calculant et transmettant en une seule fois r valeurs de b , a et z .Although the exchanges of the proposed HB + protocol are structured in revolutions of three passes, it is possible to reduce to a three-pass exchange by calculating and transmitting at once r values of b, a and z.

L'avantage du protocole HB+ réside dans la grande simplicité des calculs d'authentification.The advantage of the HB + protocol lies in the great simplicity of the authentication calculations.

De plus, il tire sa robustesse de la difficulté du problème LNP (« Low Parity with Noise ») de trouver une solution à un système linéaire bruité. Enfin, le protocole HB+ bénéficie, par comparaison avec le protocole HB historiquement antérieur et qui en différait en ce que la réponse bruitée ne comprenait pas de terme b * y , du fait de l'effet de masquage induit par le vecteur binaire b couplé à la clé secrète y ; en effet, le protocole HB était sensible aux attaques consistant pour l'adversaire à envoyer des défis a constants et à écouter les réponses du lecteur ; la réponse la plus fréquente étant a » x , et a étant connu, on pouvait dans un premier temps obtenir a » x pour un nombre suffisant de valeurs de a , et dans un deuxième temps en déduire x par résolution d'un système linéaire.In addition, it draws its robustness from the difficulty of the problem LNP ("Low Parity with Noise") to find a solution to a noisy linear system. Finally, the HB + protocol benefits, by comparison with the HB protocol historically prior and differing in that the noise response did not include a term b * y, because of the masking effect induced by the binary vector b coupled to the secret key y; indeed, the HB protocol was sensitive to attacks consisting of the opponent sending constant challenges and listening to the reader's responses; the most frequent answer being a »x, and a being known, one could at first obtain a» x for a sufficient number of values of a, and in a second time deduce x by resolution of a linear system.

Cependant, le protocole HB+ présente des inconvénients qui lui interdisent d'être utilisé efficacement dans la pratique.However, the HB + protocol has drawbacks that prohibit it from being used effectively in practice.

Un premier inconvénient tient au fait que même si, comme on l'a vu, il résiste à certaines attaques actives sur a , ce protocole reste néanmoins vulnérable à d'autres attaques rencontrées lorsqu'un adversaire a accès aux résultats en termes de succès/échecs de plusieurs authentifications successives.A first disadvantage is that even if, as we have seen, it resists some active attacks on a, this protocol is nevertheless vulnerable to other attacks encountered when an adversary has access to results in terms of success / failures of several successive authentications.

Une telle attaque consiste à intercepter le défi a lors de sa transmission du lecteur vers la puce et à en modifier successivement les bits. Si, par exemple, le premier bit de a est modifié, on comprend que si le résultat n'est pas changé à la suite de cette modification, on peut en conclure que le premier bit du vecteur secret x est vraisemblablement 0. Inversement, si le résultat est changé, le premier bit de x est probablement égal à 1. Pour obtenir la totalité des n bits de x , il suffit de modifier le deuxième bit de a pour connaître le deuxième bit de x , et ainsi de suite jusqu'à n .Such an attack consists in intercepting the challenge when transmitting the reader to the chip and successively modifying the bits. If, for example, the first bit of a is modified, it is understood that if the result is not changed as a result of this modification, it can be concluded that the first bit of the secret vector x is probably 0. Conversely, if the result is changed, the first bit of x is probably equal to 1. To obtain all of the n bits of x, it suffices to modify the second bit of a to know the second bit of x, and so on until not .

Un deuxième inconvénient du protocole HB+ est qu'il aboutit à un nombre de fausses alertes excessivement élevé, une fausse alerte étant définie comme le rejet de l'authentification de puces légitimes. Ainsi, par exemple, avec les valeurs « = 224 bits, /7 = 0,25 , r = 100 tours et t = η x r = 25 , le taux de fausses alertes est de 45% , valeur tout à fait inacceptable. Le taux de faux positifs, c'est-à-dire de succès de l'authentification pour des puces répondant au hasard, est voisin de 3 10~7 .A second disadvantage of the HB + protocol is that it results in an excessively high number of false alerts, a false alarm being defined as the rejection of the authentication of legitimate chips. Thus, for example, with the values "= 224 bits, / 7 = 0.25, r = 100 revolutions and t = η xr = 25, the false alarm rate is 45%, a value that is totally unacceptable. The false-positive rate, that is, the success of authentication for random chips, is close to 3 10 ~ 7 .

Si au lieu de prendre pour t la valeur attendue η x r = 25 , on prend une valeur supérieure comme par exemple 35 , le taux de fausses alertes descend à 1% , ce qui reste inacceptable, mais le taux de faux positifs augmente à environ 1,7 - 10"3.If instead of taking for the expected value η xr = 25, we take a higher value, for example 35, the false alarm rate goes down to 1%, which remains unacceptable, but the rate of false positives increases to about 1.7 - 10 "3 .

Enfin, un troisième inconvénient de HB+ est la complexité excessive qu'il induit dans les communications entre la puce et le lecteur. Avec les mêmes chiffres que précédemment, on peut voir qu'il est nécessaire d'échanger 44900 bits à chaque authentification, soit, à chacun des 100 tours, 224 bits pour b , 224 bits pour a , et un bit pour le résultat z .Finally, a third disadvantage of HB + is the excessive complexity that it induces in the communications between the chip and the reader. With the same figures as before, it can be seen that it is necessary to exchange 44900 bits with each authentication, ie, at each of the 100 turns, 224 bits for b, 224 bits for a, and one bit for the result z.

On voit que, même avec un débit de 10000 bits/s, il faut plus de quatre secondes au lecteur pour authentifier une puce, ce qui reste une valeur prohibitive pour l'ergonomie du système, sans compter les problèmes d'alimentation de la puce qui en découlent.It can be seen that, even with a bit rate of 10000 bits / s, it takes more than four seconds for the reader to authenticate a chip, which remains a prohibitive value for the ergonomics of the system, not to mention the power supply problems of the chip. who as a result.

L'invention concerne donc un procédé d'authentification d'une entité auprès d'une entité vérificatrice, lesdites entités partageant une paire de clés secrètes X et Y . Ledit procédé est remarquable en ce que lesdites clés secrètes X et Y sont des matrices binaires n x m (n,m >l), et en ce qu'il comprend des étapes répétées r fois ( r > 1) consistant :The invention therefore relates to a method of authenticating an entity with a checking entity, said entities sharing a pair of secret keys X and Y. Said method is remarkable in that said secret keys X and Y are binary matrices n x m (n, m> 1), and that it comprises repeated steps r times (r> 1) consisting of:

- pour l'entité à authentifier et l'entité vérificatrice, à échanger des vecteurs binaires a et b de n bits respectivement tirés au sort par l'entité vérificatrice et l'entité à authentifier, et, pour l'entité à authentifier, à tirer au sort un vecteur binaire de bruit c de m bits, chacun desdits m bits étant égal à 1 avec une probabilité η inférieure à 1/2 , et à calculer et transmettre à l'entité vérificatrice un vecteur de réponse z de m bits égal à z = aX ® bY ® c ,for the entity to be authenticated and the auditing entity, to exchange binary vectors a and b of n bits randomly selected by the verifier entity and the entity to be authenticated, and, for the entity to be authenticated, to randomly selecting a binary noise vector c of m bits, each of said m bits being equal to 1 with a probability η less than 1/2, and calculating and transmitting to the checking entity a response vector z of m bits equal to at z = aX ® bY ® c,

- pour l'entité vérificatrice, à calculer le poids de Hamming d'un vecteur d'erreur e = z ® aX ®bY , puis, pour l'entité vérificatrice, à accepter l'authentification si les poids de Hamming des r vecteurs d'erreur e vérifient une relation de comparaison à un paramètre fonction de la probabilité η .- for the auditing entity, to calculate the Hamming weight of an error vector e = z ® aX ®bY, then, for the auditing entity, to accept the authentication if the Hamming weights of the r vectors d error e verify a relation of comparison to a parameter function of the probability η.

Ainsi, on peut constater que le procédé conforme à l'invention offre, par rapport au protocole HB+, une meilleure résistance aux attaques consistant à modifier les bits du défi a dans le but de reconstituer le secret X . En effet, si le premier bit de a est modifié, cette modification affecte les produits de ce bit avec les premiers bits des m colonnes de X , ce qui affecte également les m bits du produit aX et donc la réponse z dans son ensemble. Par conséquent, il n'est pas possible de déduire de l'observation de l'effet d'une modification de bits de a sur le résultat d'authentification une quelconque information sur le secret X puisque plusieurs des m bits de z peuvent être modifiés sans qu'on puisse connaître leur nombre ni leur position, alors que dans le cas du protocole HB+ toute modification d'un bit de a affecte directement la réponse z , celle-ci n'étant constituée que d'un seul bit.Thus, it can be seen that the method according to the invention offers, compared to the HB + protocol, a better resistance to attacks consisting in modifying the bits of the challenge a in order to reconstitute the secret X. Indeed, if the first bit of a is modified, this modification affects the products of this bit with the first bits of the m columns of X, which also affects the m bits of the product aX and therefore the response z as a whole. Therefore, it is not possible to deduce from the observation of the effect of a bit modification of a on the authentication result any information on the secret X since several of the m bits of z can be modified without we can know their number and their position, whereas in the case of the HB + protocol any modification of a bit of a directly affects the response z, this one consisting of only one bit.

S'agissant des performances du procédé, objet de l'invention, il faut observer que, la réponse z à chaque tour s'écrivant sur m bits, tout se passe en substance comme si on effectuait m tours en un seul. II en résulte que, dans une première situation extrême, on peut réduire d'un facteur de l'ordre de m le nombre de tours, et donc en pratique limiter le nombre de tours à un seul, ce qui permet de conserver les performances du protocole HB+ en taux de fausses alertes, mais en réduisant le nombre de bits échangés de r(2n + \) à (2n + m ), c'est à dire de 44900 bits à 576 bits, avec « = 224 et m = 128 , ce qui représente un gain considérable. On comprend sur cet exemple tout l'intérêt de l'invention de permettre de limiter à 1 le nombre r de tours, ce qui est impossible à envisager dans le cas du protocole HB+.Regarding the performance of the method, object of the invention, it should be noted that, the response z at each round on m bits, everything happens in substance as if we performed m turns in one. As a result, in a first extreme situation, it is possible to reduce by a factor of the order of m the number of revolutions, and therefore in practice limit the number of revolutions to one, which makes it possible to maintain the performances of the HB + protocol in false alarm rate, but reducing the number of bits exchanged from r (2n + \) to (2n + m), ie from 44900 bits to 576 bits, with "= 224 and m = 128 which represents a considerable gain. It is understood in this example the interest of the invention to allow to limit the number r of revolutions, which is impossible to envisage in the case of the HB + protocol.

Dans une deuxième situation extrême, le nombre de tours est le même. Dans ce cas, le nombre de données échangées augmente légèrement, mais par contre le taux de fausses alertes devient insignifiant.In a second extreme situation, the number of turns is the same. In this case, the number of data exchanged increases slightly, but against the false alarm rate becomes insignificant.

Bien entendu, une situation réaliste sera choisie entre ces deux situations extrêmes avec à la fois une réduction du taux de fausses alertes et du nombre de bits échangés entre la puce et le lecteur. Quoiqu'il en soit, il est clair que la présente invention offre de meilleures performances que le protocole HB+ en termes de taux de fausses alertes et de quantité d'informations devant être échangées entre les deux entités concernées.Of course, a realistic situation will be chosen between these two extreme situations with both a reduction in the rate of false alarms and the number of bits exchanged between the chip and the reader. Be that as it may, it is clear that the present invention offers better performance than the HB + protocol in terms of false alarm rates and the amount of information to be exchanged between the two entities concerned.

Selon un mode de réalisation particulier de l'invention, lesdites matrices X et Y sont des matrices de Toeplitz. On verra en détail plus loin que cette disposition avantageuse permet de limiter la capacité de stockage des puces et des lecteurs à (n + m - 1) au lieu de n x m dans le cas de matrices choisies quelconques. Un autre avantage est de simplifier le calcul des produits άX et bY .According to a particular embodiment of the invention, said matrices X and Y are matrices of Toeplitz. It will be seen in detail later that this advantageous arrangement makes it possible to limit the storage capacity of chips and readers to (n + m - 1) instead of nxm in the case of selected dies. any. Another advantage is to simplify the calculation of the products άX and bY.

L'invention concerne également une entité destinée à être authentifiée par une entité vérificatrice, lesdites entités partageant une paire de clés secrètes X et Y , remarquable en ce que ladite entité à authentifier comprend des moyens de stockage de clés secrètes X et Y constituées par des matrices binaires n x m (n,m>l), des moyens de communication avec l'entité vérificatrice, et des moyens de calcul aptes à effectuer r fois ( r ≥ l) les étapes consistant : - à tirer au sort et transmettre à l'entité vérificatrice un vecteur binaire b de n bits,The invention also relates to an entity intended to be authenticated by a checking entity, said entities sharing a pair of secret keys X and Y, remarkable in that said entity to be authenticated comprises means for storing secret keys X and Y constituted by binary matrices nxm (n, m> 1), communication means with the checking entity, and calculation means adapted to perform r times (r ≥ 1) the steps of: - drawing lots and transmitting to the entity checking a binary vector b of n bits,

- à recevoir de l'entité vérificatrice un vecteur binaire a de n bits,to receive from the auditing entity a bit vector a of n bits,

- à tirer au sort un vecteur binaire de bruit c de m bits, chacun desdits m bits étant égal à 1 avec une probabilité η inférieure à 1/2 , et à calculer et transmettre à l'entité vérificatrice un vecteur de réponse z de m bits égal à z = aX @bY @ c .randomly drawing a binary noise vector c of m bits, each of said m bits being equal to 1 with a probability η less than 1/2, and calculating and transmitting to the checking entity a response vector z of m bits equal to z = aX @ bY @ c.

L'invention concerne en outre un programme d'ordinateur comprenant des instructions de programme pour la mise en œuvre des étapes effectuées par ladite entité à authentifier lorsque ledit programme est exécuté par un ordinateur faisant partie desdits moyens de calcul de l'entité à authentifier.The invention further relates to a computer program comprising program instructions for implementing the steps performed by said entity to authenticate when said program is executed by a computer forming part of said computing means of the entity to be authenticated.

L'invention concerne, de plus, une entité vérificatrice partageant une paire de clés secrètes X et F avec une entité à authentifier, remarquable en ce que ladite entité vérificatrice comprend des moyens de stockage de clés secrètes X et Y constituées par des matrices binaires nx m (n,m>l), des moyens de communication avec l'entité à authentifier, et des moyens de calcul aptes à effectuer r fois ( r ≥ l) les étapes consistant :The invention also relates to a verification entity sharing a pair of secret keys X and F with an entity to be authenticated, which is remarkable in that the said checking entity comprises means for storing secret keys X and Y constituted by nx bit matrices. m (n, m> l), communication means with the entity to be authenticated, and calculation means able to perform r times (r ≥ 1) the steps of:

- à recevoir de l'entité à authentifier un vecteur binaire b de n bits,to receive from the entity to authenticate a binary vector b of n bits,

- à tirer au sort et transmettre à l'entité à authentifier un vecteur binaire a de n bits, - à recevoir de l'entité à authentifier un vecteur de réponse z de m bits,randomly and transmit to the entity to authenticate an n-bit binary vector, to receive from the entity to authenticate an m bit response vector,

- à calculer le poids de Hamming d'un vecteur d'erreur e = z ® aX ® bY , et à accepter l'authentification si les poids de Hamming des r vecteurs d'erreur e vérifient une relation de comparaison à un paramètre (T,t) fonction d'une probabilité η prédéterminée.- to calculate the Hamming weight of an error vector e = z ® aX ® bY, and to accept the authentication if the Hamming weights of the r error vectors e verify a comparison relation to a parameter (T, t) function of a predetermined probability η.

Enfin, l'invention concerne un programme d'ordinateur comprenant des instructions de programme pour la mise en œuvre des étapes effectuées par ladite entité vérificatrice lorsque ledit programme est exécuté par un ordinateur faisant partie desdits moyens de calcul de l'entité vérificatrice.Finally, the invention relates to a computer program comprising program instructions for carrying out the steps performed by said checking entity when said program is executed by a computer forming part of said checking entity calculation means.

La description, donnée à titre d'exemple non limitatif, qui va suivre en regard des dessins annexés fera bien comprendre en quoi consiste l'invention et comment elle peut être réalisée. La figure 2 représente les échanges entre l'entité à authentifier et l'entité vérificatrice au cours du procédé conforme à l'invention.The description, given by way of non-limiting example, which follows with reference to the accompanying drawings will make it clear what the invention is and how it can be achieved. FIG. 2 represents the exchanges between the entity to be authenticated and the audit entity during the process according to the invention.

La figure 3 est un schéma d'une entité à authentifier conformément au procédé de la figure 2.FIG. 3 is a diagram of an entity to be authenticated according to the method of FIG. 2.

La figure 4 est un schéma d'une entité vérificatrice chargée d'authentifier l'entité de la figure 3 conformément au procédé de la figure 2.FIG. 4 is a diagram of a verifying entity responsible for authenticating the entity of FIG. 3 according to the method of FIG. 2.

Sur la figure 2 est illustré un procédé d'authentification permettant à une entité vérificatrice, un lecteur de puces avec ou sans contact par exemple, de vérifier l'identité d'une entité à authentifier qui, dans cet exemple, peut être une puce RFID. Le procédé décrit à la figure 2 est un procédé dit symétrique où les deux entités, puce et lecteur, partagent les mêmes clés secrètes. Celles-ci, désignées X et Y , sont des matrices binaires n x m (n,m>l) comportant n lignes et m colonnes. Les clés secrètes X et Y sont stockées dans des moyens de stockage de la puce et du lecteur référencés respectivement 10 et 20 sur la figure 2, ainsi que sur les figures 3 et 4.FIG. 2 illustrates an authentication method enabling a checking entity, a chip reader with or without contact, for example, to verify the identity of an entity to be authenticated which, in this example, may be an RFID chip . The method described in FIG. 2 is a so-called symmetrical method where the two entities, chip and reader, share the same secret keys. These, designated X and Y, are binary matrices n x m (n, m> 1) with n rows and m columns. The secret keys X and Y are stored in storage means of the chip and the reader referenced respectively 10 and 20 in FIG. 2, as well as in FIGS. 3 and 4.

Le procédé conforme à l'invention est structuré en étapes répétées r fois ( r > 1). On entend par « r fois » le fait que les échanges entre la puce et le lecteur peuvent être effectués séquentiellement en r tours de trois passes, comme indiqué sur la figure 2, où le nombre de tours nbt est incrémenté de 1 à chaque tour par un compteur (bloc 250), ou bien en parallèle sur trois passes, chaque passe comprenant la transmission de r données d'une entité à une autre. Dans l'exemple de la figure 2, la puce 1 tire au sort à chaque tour (blocThe process according to the invention is structured in repeated steps r times (r> 1). The term "r times" means that the exchanges between the chip and the reader can be carried out sequentially in revolutions of three passes, as indicated in FIG. 2, where the number of revolutions nbt is incremented by 1 at each turn by a counter (block 250), or in parallel over three passes, each pass comprising the transmission of r data from one entity to another. In the example of Figure 2, chip 1 draws at each turn (block

100) et transmet (1 ) au lecteur 2 un vecteur binaire uniligne b de n bits. Le lecteur 2 transmet (2) alors à la puce 1 un défi a (bloc 200) qui est également un vecteur binaire uniligne de n bits tiré au sort. Le tirage au sort des vecteurs binaires b et a est réalisé selon une distribution uniforme des bits 0 et 1.100) and transmits (1) to the reader 2 a single binary vector b of n bits. The reader 2 then transmits (2) to the chip 1 a challenge a (block 200) which is also a single-ended binary vector of n bits drawn at random. The draw of the binary vectors b and a is performed according to a uniform distribution of bits 0 and 1.

En réponse au défi a , la puce 1 transmet (3) au lecteur 2 un vecteur binaire uniligne z de m bits égal à la somme modulo 2 z = aX ® bY ® c (bloc 120'), où c est un vecteur binaire uniligne de bruit de m bits, tiré au sort (bloc 1 10') par la puce 1 selon une loi de probabilité assurant que chaque bit de c est égal à 1 avec une probabilité égale, ou inférieure ou égale, à un paramètre η inférieur à 1/2 . Pour ce faire, chaque bit du vecteur de bruit c peut être tiré au sort indépendamment, selon une loi de Bemoulli de paramètre η < 1/2 . Le vecteur de bruit c peut également être tiré au sort parmi l'ensemble des vecteurs de m bits dont la somme des bits, ou poids de Hamming, est au plus égale ou égale à la valeur η x m avec η < \l 2. Bien entendu, le vecteur de bruit c peut être tiré au sort par la puce en même temps qu'elle tire au sort le vecteur binaire b dont on rappellera qu'il sert de masquage aux attaques actives sur le vecteur a .In response to the challenge a, the chip 1 transmits (3) to the reader 2 a m bit binary vector z of m bits equal to the sum modulo 2 z = aX ® bY ® c (block 120 '), where c is a one-bit binary vector m bit noise, randomly drawn (block 1 10 ') by the chip 1 according to a probability law ensuring that each bit of c is equal to 1 with a probability equal to or less than or equal to a parameter η less than 1/2. To do this, each bit of the noise vector c can be drawn independently, according to a Bemoulli law of parameter η <1/2. The noise vector c can also be drawn from among the set of m bit vectors whose sum of bits, or Hamming weight, is at most equal to or equal to the value η xm with η <\ l 2. Good Of course, the noise vector c can be drawn by the chip at the same time as it draws the binary vector b which will be recalled that it serves as a masking to the active attacks on the vector a.

A chaque tour, le lecteur 2 calcule (bloc 210') un vecteur d'erreur e de m bits égal à e = z ® aX ®bY où z est le vecteur de réponse envoyé par la puce 1 , ainsi que le poids de Hamming PH(e) (bloc 220') du vecteur d'erreur e ainsi obtenu.At each turn, the reader 2 calculates (block 210 ') an error vector e of m bits equal to e = z ® aX ® bY where z is the response vector sent by the chip 1, as well as the weight of Hamming PH (e) (block 220 ') of the error vector e thus obtained.

A l'issue des r tours, l'acceptation ou le rejet de l'authentification de la puce 1 par le lecteur 2 est déterminé à partir des r poids de Hamming PH(e) des vecteurs d'erreur e obtenus à chaque tour et de leur comparaison à un paramètre fonction de la probabilité η .At the end of the rounds, acceptance or rejection of the authentication of the chip 1 by the reader 2 is determined from the Hamming weights PH (e) of the error vectors e obtained at each turn and from their comparison to a parameter function of the probability η.

Plusieurs stratégies sont alors possibles.Several strategies are then possible.

Une première stratégie, représentée sur la figure 2, consiste à accepter l'authentification (bloc 240') si et seulement si la somme S des poids de Hamming des r vecteurs d'erreur e (bloc 221 ') est inférieure à un seuil T donné (bloc 230'), égal par exemple à r(η + ε)m où ε est une marge inférieure à 1/2 , éventuellement nulle. Une deuxième stratégie consiste à accepter l'authentification si et seulement si le poids de Hamming du vecteur d'erreur e obtenu à chaque tour est inférieur à un seuil t .A first strategy, represented in FIG. 2, consists in accepting the authentication (block 240 ') if and only if the sum S of the Hamming weights of the r error vectors e (block 221') is less than a threshold T. given (block 230 '), equal for example to r (η + ε) m where ε is a margin less than 1/2, possibly zero. A second strategy is to accept the authentication if and only if the Hamming weight of the error vector e obtained at each turn is less than a threshold t.

Enfin, une troisième stratégie consiste à accepter l'authentification si et seulement si le poids de Hamming du vecteur d'erreur e obtenu à chaque tour est égal à une valeur t .Finally, a third strategy is to accept the authentication if and only if the Hamming weight of the error vector e obtained at each turn is equal to a value t.

Dans ces deux derniers cas, le paramètre t vaut (η + ε)m où ε est une marge inférieure à 1/2 , éventuellement nulle.In these two latter cases, the parameter t is (η + ε) m where ε is a margin less than 1/2, possibly zero.

En prenant r = 1 , n = 256 , m = 128 , η = 0,25 et avec un tirage au sort du vecteur de bruit c parmi les vecteurs binaires de longueur 128 et de poids de Hamming 32 , soit η x m, l'authentification de la puce sera acceptée selon la troisième stratégie ci-dessus si et seulement si le poids du vecteur d'erreur e est à chaque tour exactement égal à 32 , ceci avec ε = 0.By taking r = 1, n = 256, m = 128, η = 0.25 and with a random draw of the noise vector c among the bit vectors of length 128 and of Hamming weight 32, ie η xm, Authentication of the chip will be accepted according to the third strategy above if and only if the weight of the error vector e is at each turn exactly equal to 32, this with ε = 0.

Dans cet exemple, on peut voir que la longueur totale des échanges est de seulement 640 bits, soit ( 2n + m). D'autre part, on peut observer que le taux de fausses alertes est strictement nul et que la taux de faux positifs pour une attaque consistant à essayer une valeur aléatoire de z est voisin de 10 8 , ce qui est tout à fait acceptable en pratique.In this example, we can see that the total length of the exchanges is only 640 bits, ie (2n + m). On the other hand, one can observe that the false alarm rate is strictly zero and the false positive rate for an attack of trying a random value z is close to 10 8, which is quite acceptable in practice .

Sur la figure 2, la séquence des échanges entre la puce 1 et le lecteur 2 est : envoi de b au lecteur, envoi de a à la puce, tirage au sort de c par la puce et envoi de z au lecteur. Il faut cependant noter qu'une autre séquence pourrait également être utilisée, à savoir : envoi de a à la puce, tirage au sort de b et de c par la puce et envoi de b et de z au lecteur. Cette dernière séquence a l'avantage de réduire le nombre des échanges. Selon un mode de réalisation qui permet de réduire fortement la quantité de mémoire nécessaire pour stocker les matrices X et Y , ainsi que la complexité des calculs à effectuer par la puce et l'entité vérificatrice, chacune des matrices X et Y peut être sélectionnée à l'intérieur d'un sous- ensemble strict de l'ensemble des matrices n x m et décrite dans la puce à l'aide d'un nombre de bits strictement inférieur à n x m . Ainsi, par exemple, la quantité de mémoire nécessaire pour stocker chaque matrice peut être ramenée à seulement ( n + m -1 ) lorsque X et Y sont des matrices de Toeplitz, à savoir des matrices à coefficients constants le long des diagonales, et dont l'ensemble des coefficients est entièrement déterminé par les coefficients de la première ligne et de la première colonne. Si X est une matrice de Toeplitz et si X1 } désigne le coefficient de la i-ème ligne et de la j - ième colonne, xh] est égal à v,+u si * est supérieur ou égal à j , et à χU]→ι dans le cas contraire.In FIG. 2, the sequence of exchanges between chip 1 and reader 2 is: sending b to the reader, sending a to the chip, drawing c by the chip and sending z to the reader. However, it should be noted that another sequence could also be used, namely: sending a to the chip, drawing b and c by the chip and sending b and z to the reader. This last sequence has the advantage of reducing the number of exchanges. According to one embodiment which makes it possible to greatly reduce the amount of memory necessary to store the X and Y matrices, as well as the complexity of the calculations to be performed by the chip and the audit entity, each of the matrices X and Y can be selected at inside a strict subset of the set of matrices nxm and described in the chip using a number of bits strictly less than nxm. Thus, for example, the amount of memory needed to store each matrix can be reduced to only (n + m -1) when X and Y are Toeplitz matrices, namely matrices with constant coefficients along the diagonals, and whose set of coefficients is entirely determined by the coefficients of the first row and the first column. If X is a matrix of Toeplitz and if X 1} denotes the coefficient of the ith row and the jth column, x h] is equal to v, + u if * is greater than or equal to j, and χ U] → ι otherwise.

Le mode de réalisation suivant permet d'effectuer très efficacement bit par bit le produit d'un vecteur binaire, a par exemple, et d'une matrice de Toeplitz, X par exemple, décrite au moyen des ( n + m - 1 ) coefficients de sa première ligne et de sa première colonne, et utilisant deux registres de m bits, l'un pour calculer la ligne courante de la matrice et l'autre, initialisé à 0 , pour accumuler les résultats partiels du produit vecteur-matrice. Le premier registre est initialisé à l'aide de la première ligne de X , puis chacun des bits du vecteur a est traité de la manière suivante : si le bit courant de a est égal à 1 , la valeur de la ligne courante de X est combinée par « ou » exclusif bit à bit avec la valeur courante du registre d'accumulation des résultats partiels. Dans le cas contraire, la valeur courante de ce registre n'est pas modifiée. Dans les deux cas, tant que la ligne courante n'est pas la dernière ligne de la matrice X , le registre contenant la ligne courante de cette matrice est mis à jour en effectuant une rotation du contenu de ce registre d'un bit vers la droite, suivie de la recopie dans la cellule de gauche de ce registre du coefficient de la première colonne correspondant à la nouvelle ligne courante.The following embodiment makes it possible to very efficiently perform bit by bit the product of a binary vector, for example, and a Toeplitz matrix, X for example, described by means of the (n + m - 1) coefficients. of its first row and its first column, and using two registers of m bits, one to calculate the current row of the matrix and the other, initialized to 0, to accumulate the partial results of the vector-matrix product. The first register is initialized using the first line of X, then each of the bits of the vector a is treated in the following way: if the current bit of a is equal to 1, the value of the current line of X is combined by "or" exclusive bitwise with the current value of the register of accumulation of partial results. Otherwise, the current value of this register is not changed. In both cases, as long as the current line is not the last line of the matrix X, the register containing the current row of this matrix is updated by rotating the contents of this register one bit towards the right, followed by the copy in the left cell of this register of the coefficient of the first column corresponding to the new current line.

Comme le montre la figure 3, la puce 1 destinée à être authentifiée par le lecteur 2, ces deux entités partageant une paire de clés secrètes X et Y , comprend des moyens 10 de stockage des clés secrètes X et Y constituées par des matrices binaires n x m (n,m >l), des moyens 12 de communication avec le lecteur 2, et des moyens 1 1 de calcul aptes à effectuer r fois ( r ≥ l) les étapes consistant, conformément au procédé décrit en regard de la figure 2 :As shown in FIG. 3, the chip 1 intended to be authenticated by the reader 2, these two entities sharing a pair of secret keys X and Y, comprises means 10 for storing the secret keys X and Y constituted by binary matrices nxm (n, m> l), means 12 of communication with the reader 2, and means 1 1 of calculation able to perform r times (r ≥ 1) the steps of, according to the method described with reference to Figure 2:

- à tirer au sort et transmettre au lecteur 2 un vecteur binaire b de n bits, - à recevoir du lecteur 2 un vecteur binaire a de n bits,randomly draw and transmit to reader 2 a binary vector b of n bits, to receive from reader 2 an n bit binary vector,

- à tirer au sort un vecteur binaire de bruit c de m bits, chacun desdits m bits étant égal à 1 avec une probabilité η inférieure à 1/2 , et à calculer et transmettre au lecteur 2 un vecteur de réponse z de m bits égal à z = aX ®bY ® c .randomly drawing a binary noise vector c of m bits, each of said m bits being equal to 1 with a probability η less than 1/2, and calculating and transmitting to reader 2 a response vector z of m bits equal to z = aX ® bY ® c.

De même, on peut voir sur la figure 4 un lecteur 2 chargé d'authentifier une puce 1 , comprenant des moyens 20 de stockage des clés secrètes X et Y constituées par des matrices binaires n x m (n,m >l), des moyens 22 de communication avec la puce 1 à authentifier, et des moyens 21 de calcul aptes à effectuer r fois ( r ≥ l) les étapes consistant, conformément au procédé décrit en regard de la figure 2 :Similarly, we can see in Figure 4 a reader 2 responsible for authenticating a chip 1, comprising means 20 for storing the secret keys X and Y constituted by binary matrices nxm (n, m> l), means 22 communication with the chip 1 to authenticate, and calculation means 21 capable of performing r times (r ≥ 1) the steps of, according to the method described with reference to FIG.

- à recevoir de la puce 1 à authentifier un vecteur binaire b de n bits, - à tirer au sort et transmettre à la puce 1 un vecteur binaire a àe n bits,to receive from the chip 1 to authenticate a binary vector b of n bits, to draw lots and to transmit to the chip 1 a binary vector with n bits,

- à recevoir de la puce 1 un vecteur de réponse z àe m bits,to receive from chip 1 a response vector z with m bits,

- à calculer le poids de Hamming d'un vecteur d'erreur e = z ® aX ® bY , et à accepter l'authentification si les poids de Hamming des r vecteurs d'erreur e vérifient une relation de comparaison à un paramètre fonction de la probabilité η . En particulier, l'authentification est acceptée si la somme des poids de Hamming des vecteurs d'erreur e obtenus sur les r tours est inférieure à un paramètre égal à un seuil T , comme cela a été décrit en détail plus haut. calculating the Hamming weight of an error vector e = z® aX® bY, and accepting the authentication if the Hamming weights of the r error vectors e satisfy a comparison relation to a parameter that is a function of the probability η. In particular, authentication is accepted if the sum of the Hamming weights of the error vectors e obtained on the revolutions is less than a parameter equal to a threshold T, as has been described in detail above.

Claims

REVENDICATIONS 1. Procédé d'authentification d'une entité (1 ) auprès d'une entité vérificatrice (2), lesdites entités partageant une paire de clés secrètes X et Y , caractérisé en ce que lesdites clés secrètes X et Y sont des matrices binaires n x m (n,m>l), ledit procédé comprenant des étapes répétées r fois ( r ≥ l) consistant :1. A method of authenticating an entity (1) with a checking entity (2), said entities sharing a pair of secret keys X and Y, characterized in that said secret keys X and Y are binary matrices nxm (n, m> l), said method comprising repeated steps r times (r ≥ 1) consisting of: - pour l'entité (1 ) à authentifier et l'entité vérificatrice (2), à échanger des vecteurs binaires a et b de n bits respectivement tirés au sort par l'entité vérificatrice (2) et l'entité (1 ) à authentifier, et, pour l'entité (1 ) à authentifier, à tirer au sort un vecteur binaire de bruit c de m bits, chacun desdits m bits étant égal à 1 avec une probabilité η inférieure à 1/2 , et à calculer et transmettre à l'entité vérificatrice (2) un vecteur de réponse z de m bits égal à z = aX @bY @ c ,for the entity (1) to be authenticated and the verifier entity (2), to exchange binary vectors a and b of n bits respectively randomly selected by the checking entity (2) and the entity (1) to authenticating, and, for the entity (1) to be authenticated, randomly drawing a binary noise vector c of m bits, each of said m bits being equal to 1 with a probability η less than 1/2, and calculating and transmitting to the auditing entity (2) an answer vector z of m bits equal to z = aX @ bY @ c, - pour l'entité vérificatrice (2), à calculer le poids de Hamming d'un vecteur d'erreur e = z ® aX ® bY , puis, pour l'entité vérificatrice (2), à accepter l'authentification si les poids de Hamming des r vecteurs d'erreur e vérifient une relation de comparaison à un paramètre {T,t) fonction de la probabilité η .- for the auditing entity (2), to calculate the Hamming weight of an error vector e = z ® aX ® bY, then, for the verifier entity (2), to accept the authentication if the weights Hamming of the error vectors e verify a relation of comparison to a parameter {T, t) function of the probability η. 2. Procédé selon la revendication 1 , dans lequel ladite relation de comparaison consiste en ce que la somme des poids de Hamming des vecteurs d'erreur e obtenus sur les r tours est inférieure à un paramètre égal à un seuil T .2. The method according to claim 1, wherein said comparison relation consists in that the sum of the Hamming weights of the error vectors e obtained on the revolutions is less than a parameter equal to a threshold T. 3. Procédé selon la revendication 2, dans lequel le seuil T vaut r(η + ε)m où ε est une marge inférieure à 1/2 .3. The method of claim 2, wherein the threshold T is r (η + ε) m where ε is a margin less than 1/2. 4. Procédé selon la revendication 1 , dans lequel ladite relation de comparaison consiste en ce que le poids de Hamming du vecteur d'erreur e obtenu à chaque tour est inférieur à un paramètre égal à un seuil t .The method of claim 1, wherein said comparison relation is that the Hamming weight of the error vector e obtained at each turn is less than a parameter equal to a threshold t. 5. Procédé selon la revendication 1 , dans lequel ladite relation de comparaison consiste en ce que le poids de Hamming du vecteur d'erreur e obtenu à chaque tour est égal à un paramètre égal à une valeur t . The method of claim 1, wherein said comparison relation is that the Hamming weight of the error vector e obtained at each turn is equal to a parameter equal to a value t. 6. Procédé selon l'une des revendications 4 ou 5, dans lequel t vaut (η + ε)m où ε est une marge inférieure à 1/2 .6. Method according to one of claims 4 or 5, wherein t is (η + ε) m where ε is a margin less than 1/2. 7. Procédé selon l'une quelconque des revendications 1 à 6, dans lequel lesdites matrices X et Y sont des matrices de Toeplitz. The method of any one of claims 1 to 6, wherein said X and Y matrices are Toeplitz matrices. 8. Entité destinée à être authentifiée par une entité vérificatrice (2), lesdites entités partageant une paire de clés secrètes X et Y , caractérisée en ce que ladite entité (1 ) à authentifier comprend des moyens (10) de stockage de clés secrètes X et Y constituées par des matrices binaires n x m (n,m>l), des moyens (12) de communication avec l'entité vérificatrice (2), et des moyens (11 ) de calcul aptes à effectuer r fois ( r > 1) les étapes consistant :8. Entity intended to be authenticated by a checking entity (2), said entities sharing a pair of secret keys X and Y, characterized in that said entity (1) to be authenticated comprises means (10) for storing secret keys X and Y constituted by binary matrices nxm (n, m> 1), means (12) for communication with the auditing entity (2), and calculation means (11) able to perform r times (r> 1) the steps of: - à tirer au sort et transmettre à l'entité vérificatrice (2) un vecteur binaire b de n bits,drawing lots and transmitting to the checking entity (2) a binary vector b of n bits, - à recevoir de l'entité vérificatrice (2) un vecteur binaire a όe n bits,to receive from the checking entity (2) a binary vector with n bits, - à tirer au sort un vecteur binaire de bruit c de m bits, chacun desdits m bits étant égal à 1 avec une probabilité η inférieure à 1/2 , et à calculer et transmettre à l'entité vérificatrice (2) un vecteur de réponse z de m bits égal à z = aX ® bY θ c .randomly drawing a binary noise vector c of m bits, each of said m bits being equal to 1 with a probability η less than 1/2, and calculating and transmitting to the auditing entity (2) a response vector z of m bits equal to z = aX ® bY θ c. 9. Programme d'ordinateur comprenant des instructions de programme pour la mise en œuvre des étapes de la revendication 8 lorsque ledit programme est exécuté par un ordinateur faisant partie desdits moyens (1 1 ) de calcul de l'entité (1 ) à authentifier.9. A computer program comprising program instructions for implementing the steps of claim 8 when said program is executed by a computer belonging to said means (1 1) for calculating the entity (1) to be authenticated. 10. Entité vérificatrice partageant une paire de clés secrètes X et Y avec une entité (1 ) à authentifier, caractérisée en ce que ladite entité vérificatrice (2) comprend des moyens (20) de stockage de clés secrètes X et Y constituées par des matrices binaires n x m (n,m >l), des moyens (22) de communication avec l'entité (1 ) à authentifier, et des moyens (21 ) de calcul aptes à effectuer r fois ( r > 1) les étapes consistant :10. Verifying entity sharing a pair of secret keys X and Y with an entity (1) to be authenticated, characterized in that said checking entity (2) comprises means (20) for storing secret keys X and Y constituted by matrices nxm binaries (n, m> l), means (22) for communication with the entity (1) to be authenticated, and means (21) for calculating able to carry out r times (r> 1) the steps of: - à recevoir de l'entité (1 ) à authentifier un vecteur binaire b de n bits,to receive from the entity (1) to authenticate a binary vector b of n bits, - à tirer au sort et transmettre à l'entité (1 ) à authentifier un vecteur binaire a de n bits,to draw lots and to transmit to the entity (1) to authenticate a binary vector a of n bits, - à recevoir de l'entité (1 ) à authentifier un vecteur de réponse z de m bits,to receive from the entity (1) to authenticate a response vector z of m bits, - à calculer le poids de Hamming d'un vecteur d'erreur e = z ® aX ® bY , et à accepter l'authentification si les poids de Hamming des r vecteurs d'erreur e vérifient une relation de comparaison à un paramètre (T,t) fonction d'une probabilité η prédéterminée.- to calculate the Hamming weight of an error vector e = z ® aX ® bY, and to accept the authentication if the Hamming weights of the r error vectors e verify a comparison relation to a parameter (T, t) function of a predetermined probability η. 1 1. Programme d'ordinateur comprenant des instructions de programme pour la mise en œuvre des étapes de la revendication 10 lorsque ledit programme est exécuté par un ordinateur faisant partie desdits moyens (21 ) de calcul de l'entité vérificatrice (2). A computer program comprising program instructions for carrying out the steps of claim 10 when said program is executed by a computer forming part of said checking entity (2) computing means (21).
EP08805825A 2007-05-23 2008-05-21 Method of authentication of an entity by a verifying entity Active EP2149221B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0755216A FR2916594A1 (en) 2007-05-23 2007-05-23 METHOD FOR AUTHENTICATING AN ENTITY BY A VERIFYING ENTITY
PCT/FR2008/050879 WO2008149031A2 (en) 2007-05-23 2008-05-21 Method of authentication of an entity by a verifying entity

Publications (2)

Publication Number Publication Date
EP2149221A2 true EP2149221A2 (en) 2010-02-03
EP2149221B1 EP2149221B1 (en) 2012-09-12

Family

ID=38736034

Family Applications (1)

Application Number Title Priority Date Filing Date
EP08805825A Active EP2149221B1 (en) 2007-05-23 2008-05-21 Method of authentication of an entity by a verifying entity

Country Status (6)

Country Link
US (1) US8458474B2 (en)
EP (1) EP2149221B1 (en)
JP (1) JP5318092B2 (en)
CN (1) CN101682510B (en)
FR (1) FR2916594A1 (en)
WO (1) WO2008149031A2 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BRPI1010602A2 (en) * 2009-05-13 2016-03-15 Daniel Wayne Engels system and metood to securely identify and authenticate devices in a symmetric encryption system
JP5466032B2 (en) * 2010-02-10 2014-04-09 Kddi株式会社 Authentication system, authentication method and program
JP2012212422A (en) * 2011-03-24 2012-11-01 Sony Corp Information processor, information processing method, and program
JP2012227901A (en) * 2011-04-22 2012-11-15 Toshiba Corp Authentication component, authenticated component and authentication method therefor
JP2012227899A (en) 2011-04-22 2012-11-15 Toshiba Corp Authentication component, authenticated component and authentication method therefor
JP2012227900A (en) * 2011-04-22 2012-11-15 Toshiba Corp Authentication component, authenticated component and authentication method
JP2013005293A (en) * 2011-06-17 2013-01-07 Toshiba Corp Authentication component, authentication target component, and authentication method for the same
KR101489599B1 (en) 2013-11-05 2015-02-04 한양대학교 에리카산학협력단 Method and system for verifying integrity of data file stored in storage
US9946903B2 (en) 2016-03-24 2018-04-17 Vladimir Kozlov Authenticity verification system and methods of use
US11977621B2 (en) 2018-10-12 2024-05-07 Cynthia Fascenelli Kirkeby System and methods for authenticating tangible products
CA3157174A1 (en) 2018-10-12 2020-04-16 Cynthia Fascenelli KIRKEBY System and methods for authenticating tangible products
CN113641984B (en) * 2021-08-30 2024-12-17 杭州百子尖科技股份有限公司 Encryption authentication method of data acquisition equipment
US12512994B2 (en) * 2022-10-31 2025-12-30 Royal Bank Of Canada System and method for zero-knowledge facial recognition

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2700430B1 (en) * 1992-12-30 1995-02-10 Jacques Stern Method of authenticating at least one identification device by a verification device and device for its implementation.
US7269277B2 (en) * 1999-12-14 2007-09-11 Davida George I Perfectly secure authorization and passive identification with an error tolerant biometric system
CN100369404C (en) * 2002-01-10 2008-02-13 张红雨 Chaotic encipher series generator
US20050159942A1 (en) * 2004-01-15 2005-07-21 Manoj Singhal Classification of speech and music using linear predictive coding coefficients
KR100771911B1 (en) * 2005-02-04 2007-11-01 삼성전자주식회사 How to set security keys between wireless network devices
DE102005028221B4 (en) * 2005-06-17 2007-10-11 Infineon Technologies Ag Device and method for protecting the integrity of data
JP4863283B2 (en) * 2007-02-19 2012-01-25 独立行政法人産業技術総合研究所 Authentication system with lightweight authentication protocol

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2008149031A3 *

Also Published As

Publication number Publication date
FR2916594A1 (en) 2008-11-28
WO2008149031A2 (en) 2008-12-11
JP5318092B2 (en) 2013-10-16
JP2010528512A (en) 2010-08-19
CN101682510B (en) 2012-08-15
US20100161988A1 (en) 2010-06-24
CN101682510A (en) 2010-03-24
WO2008149031A3 (en) 2009-02-19
US8458474B2 (en) 2013-06-04
EP2149221B1 (en) 2012-09-12

Similar Documents

Publication Publication Date Title
EP2149221B1 (en) Method of authentication of an entity by a verifying entity
CA2112518C (en) Process for the authentication of at least one identification device using a verification device and implementation device
EP2532140B1 (en) Method for identifying and authenticating an rfid tag by a reader
EP2446579B1 (en) Process for mutually authenticating a reader and a radio tag
FR3054905B1 (en) KEY GENERATION METHOD AND ACCESS CONTROL METHOD
EP1055203B1 (en) Protocol between an electronic key and a lock
FR2933216A1 (en) METHOD AND SYSTEM FOR VALIDATING A SUCCESSION OF EVENTS VECUTED BY A DEVICE
EP2520041B1 (en) Method for generating a look-up table for a cryptographic white box
EP2158720B1 (en) Method of authentication using a decoding of an error correcting code on the basis of a public matrix
FR2937484A1 (en) DIGITAL SIGNATURE METHOD IN TWO STEPS
FR2948793A1 (en) SECURE METHOD OF RECONSTRUCTING A REFERENCE MEASUREMENT OF CONFIDENTIAL DATA FROM A BRUTE MEASUREMENT OF THIS DATA, IN PARTICULAR FOR THE GENERATION OF CRYPTOGRAPHIC KEYS
EP2415199B1 (en) Method for performing a cryptographic task in an electronic component
WO2000062477A1 (en) Authentication and signature method for messages using reduced size of binary units of information content and corresponding systems
EP3857810B1 (en) Cryptographic method of secure comparison of two secret data x and y
EP2374240B1 (en) Method of implementing a block encryption algorithm
WO2009083528A1 (en) Method and system for generating stable biometric data
FR3007552A1 (en) SECURE METHOD OF COMPARING TWO OPERANDS AND CORRESPONDING DEVICE
EP2661841A1 (en) Tracing device and method
CA2613884C (en) Method for providing a secured communication between a user and an entity
EP1352494B1 (en) Device and method for executing a cryptographic algorithm
FR2830146A1 (en) Implementation of cryptography algorithms in an electronic chip card or component whereby a value for use in the encryption algorithm is first selected in such a manner that differential power attacks are frustrated
FR2916317A1 (en) PROTECTION OF EXECUTION OF A CRYPTOGRAPHIC CALCULATION
WO2009083527A1 (en) Method and system for authenticating individuals on the basis of biometric data
WO2005096135A2 (en) Method and device for performing a cryptographic operation
EP4441954B1 (en) Method for processing a digital proof, system and corresponding program

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20091126

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA MK RS

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

DAX Request for extension of the european patent (deleted)
GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 575458

Country of ref document: AT

Kind code of ref document: T

Effective date: 20120915

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602008018769

Country of ref document: DE

Effective date: 20121108

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20121212

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20120912

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 575458

Country of ref document: AT

Kind code of ref document: T

Effective date: 20120912

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

Effective date: 20120926

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20121213

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130112

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20121223

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20130114

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20121212

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

26N No opposition filed

Effective date: 20130613

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602008018769

Country of ref document: DE

Effective date: 20130613

BERE Be: lapsed

Owner name: FRANCE TELECOM

Effective date: 20130531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130531

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130531

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130521

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20120912

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20130521

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20080521

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 9

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 10

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20250423

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20250423

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20250423

Year of fee payment: 18